File _patchinfo of Package patchinfo.31637
<patchinfo incident="31637">
<issue tracker="bnc" id="1214327">VUL-0: CVE-2023-37369: qt3,libqt5-qtbase,qt6-base,libqt4: buffer overflow in QXmlStreamReader</issue>
<issue tracker="bnc" id="1222120">VUL-0: CVE-2023-45935: libqt4,libqt5-qtbase,qt3,qt6-base: NULL pointer dereference via QXcbConnection::initializeAllAtoms()</issue>
<issue tracker="bnc" id="1227426">VUL-0: CVE-2024-39936: libqt4,libqt5-qtbase,qt3,qt6-base: delay any HTTP2 communication until encrypted() can be responded to</issue>
<issue tracker="bnc" id="1227513">libQt5Sql5-unixODBC regression</issue>
<issue tracker="bnc" id="1218413">VUL-0: CVE-2023-51714: libqt4,libqt5-qtbase,qt3,qt6-base: incorrect integer overflow check</issue>
<issue tracker="cve" id="2023-37369"/>
<issue tracker="cve" id="2023-45935"/>
<issue tracker="cve" id="2024-39936"/>
<issue tracker="cve" id="2023-51714"/>
<issue tracker="jsc" id="PED-6193"/>
<packager>alarrosa</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for libqt5-qtbase</summary>
<description>This update for libqt5-qtbase fixes the following issues:
- CVE-2023-37369: Fixed a buffer overflow in QXmlStreamReader (QTBUG-91889, bsc#1214327).
- CVE-2023-45935: Fixed NULL pointer dereference in QXcbConnection::initializeAllAtoms() due to anomalous behavior from the X server (bsc#1222120)
- CVE-2024-39936: Fixed information leakage due to process HTTP2 communication before encrypted() can be responded to (bsc#1227426)
- CVE-2023-51714: Fixed an incorrect integer overflow check (bsc#1218413).
Other fixes:
- Add patch from upstream to fix a regression in the ODBC driver (bsc#1227513, QTBUG-112375)
- Add upstream patch to fix a potential overflow in assemble_hpack_block()
- Use pkgconfig(icu-18n) to select current icu
</description>
</patchinfo>